Ir arriba

Reversing DJI Enhanced Wi-Fi Protocol

We present a detailed analysis of the DJI enhanced Wi-Fi communication protocol, focusing on the reverse engineering of its structure, encryption mechanisms, and packet transmission. Key experiments involve the collection and decoding of wireless traffic between drones and controllers, utilizing tools like aircrack-ng and Wireshark to break WEP encryption. The analysis highlights the exploitation of vulnerabilities such as weak initialization vectors (IVs), ARP injection attacks, and packet length patterns. By identifying specific fields within packets, including headers, padding, and metadata, the document provides insights into the protocol’s functionality, including connection initialization and data transmission. Advanced cracking techniques and potential optimizations for key recovery are also discussed, emphasizing the challenges and strategies in drone communication security.

Alumno

Feng Zhou

Ofertado en

  • Máster en Ingeniería de Telecomunicación - (MIT)